2020
DOI: 10.30534/ijeter/2020/14812020
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Factor Authentication through Integration with IMS System

Abstract: The main concern for the customers and the organizations to use services offered by Cloud computing providers is the confidentiality and security of the data stored using the sharable infrastructure. Customers also want to use the support provided by the service providers according to their application requirements, which leads to the configuration of the infrastructure provided to the customers as per their requirements.Most of the cloud computing services provided are rigid and do not allow customers to make… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…If a specified threshold value increases the amount of such failures to forward packets, the guilty node would be marked as a malicious node. Knowledge regarding hazardous nodes is forwarded to the feature pathrater for use in path evaluation [14].…”
Section: Related Workmentioning
confidence: 99%
“…If a specified threshold value increases the amount of such failures to forward packets, the guilty node would be marked as a malicious node. Knowledge regarding hazardous nodes is forwarded to the feature pathrater for use in path evaluation [14].…”
Section: Related Workmentioning
confidence: 99%
“…After that there will be discussions with experts who previously used similar machines or types to determine the judgment quantity or amount that should be in the warehouse. From the type and value of the emergency spare part, it will be compared with the initial solution or recommendation from the manufacturer so that the subsequent tenders can be determined quickly the inventory costs [25][26].…”
Section: Figure2:budgeting Compotition Oandm Pembangkitlistrikmentioning
confidence: 99%
“…DSM fetches the requested record from the related user-space using encrypted primary key data. 19. The queried data is sent to the client, and no decryption is done on the cloud side.…”
Section: Data Isolation Through Multiple User Spacesmentioning
confidence: 99%